public inbox for pve-devel@lists.proxmox.com
 help / color / mirror / Atom feed
From: "Max Carrara" <m.carrara@proxmox.com>
To: "Proxmox VE development discussion" <pve-devel@lists.proxmox.com>
Subject: Re: [pve-devel] [PATCH proxmox-perl-rs 21/21] add PVE::RS::Firewall::SDN module
Date: Tue, 13 Aug 2024 18:14:45 +0200	[thread overview]
Message-ID: <D3EX1L38BR0Y.3RTSBJQO8U64M@proxmox.com> (raw)
In-Reply-To: <20240626121550.292290-22-s.hanreich@proxmox.com>

On Wed Jun 26, 2024 at 2:15 PM CEST, Stefan Hanreich wrote:
> Used for obtaining the IPSets that get autogenerated by the nftables
> firewall. The returned configuration has the same format as the
> pve-firewall uses internally, making it compatible with the existing
> pve-firewall code.
>
> Signed-off-by: Stefan Hanreich <s.hanreich@proxmox.com>
> ---
>  pve-rs/Cargo.toml          |   1 +
>  pve-rs/Makefile            |   1 +
>  pve-rs/src/firewall/mod.rs |   1 +
>  pve-rs/src/firewall/sdn.rs | 130 +++++++++++++++++++++++++++++++++++++
>  pve-rs/src/lib.rs          |   1 +
>  5 files changed, 134 insertions(+)
>  create mode 100644 pve-rs/src/firewall/mod.rs
>  create mode 100644 pve-rs/src/firewall/sdn.rs
>
> diff --git a/pve-rs/Cargo.toml b/pve-rs/Cargo.toml
> index e40588d..f612b3a 100644
> --- a/pve-rs/Cargo.toml
> +++ b/pve-rs/Cargo.toml
> @@ -43,3 +43,4 @@ proxmox-subscription = "0.4"
>  proxmox-sys = "0.5"
>  proxmox-tfa = { version = "4.0.4", features = ["api"] }
>  proxmox-time = "2"
> +proxmox-ve-config = { version = "0.1.0" }

This hunk doesn't apply anymore because proxmox-sys was bumped.

Manually adding proxmox-ve-config as depencency works just fine though,
so this needs just a little rebase.

> diff --git a/pve-rs/Makefile b/pve-rs/Makefile
> index c6b4e08..d01da69 100644
> --- a/pve-rs/Makefile
> +++ b/pve-rs/Makefile
> @@ -28,6 +28,7 @@ PERLMOD_GENPACKAGE := /usr/lib/perlmod/genpackage.pl \
>  
>  PERLMOD_PACKAGES := \
>  	  PVE::RS::APT::Repositories \
> +	  PVE::RS::Firewall::SDN \
>  	  PVE::RS::OpenId \
>  	  PVE::RS::ResourceScheduling::Static \
>  	  PVE::RS::TFA
> diff --git a/pve-rs/src/firewall/mod.rs b/pve-rs/src/firewall/mod.rs
> new file mode 100644
> index 0000000..8bd18a8
> --- /dev/null
> +++ b/pve-rs/src/firewall/mod.rs
> @@ -0,0 +1 @@
> +pub mod sdn;
> diff --git a/pve-rs/src/firewall/sdn.rs b/pve-rs/src/firewall/sdn.rs
> new file mode 100644
> index 0000000..55f3e93
> --- /dev/null
> +++ b/pve-rs/src/firewall/sdn.rs
> @@ -0,0 +1,130 @@
> +#[perlmod::package(name = "PVE::RS::Firewall::SDN", lib = "pve_rs")]
> +mod export {
> +    use std::collections::HashMap;
> +    use std::{fs, io};
> +
> +    use anyhow::{bail, Context, Error};
> +    use serde::Serialize;
> +
> +    use proxmox_ve_config::{
> +        common::Allowlist,
> +        firewall::types::ipset::{IpsetAddress, IpsetEntry},
> +        firewall::types::Ipset,
> +        guest::types::Vmid,
> +        sdn::{
> +            config::{RunningConfig, SdnConfig},
> +            ipam::{Ipam, IpamJson},
> +            SdnNameError, VnetName,

SdnNameError isn't used here.

> +        },
> +    };
> +
> +    #[derive(Clone, Debug, Default, Serialize)]
> +    pub struct LegacyIpsetEntry {
> +        nomatch: bool,
> +        cidr: String,
> +        comment: Option<String>,
> +    }
> +
> +    impl LegacyIpsetEntry {
> +        pub fn from_ipset_entry(entry: &IpsetEntry) -> Vec<LegacyIpsetEntry> {
> +            let mut entries = Vec::new();
> +
> +            match &entry.address {
> +                IpsetAddress::Alias(name) => {
> +                    entries.push(Self {
> +                        nomatch: entry.nomatch,
> +                        cidr: name.to_string(),
> +                        comment: entry.comment.clone(),
> +                    });
> +                }
> +                IpsetAddress::Cidr(cidr) => {
> +                    entries.push(Self {
> +                        nomatch: entry.nomatch,
> +                        cidr: cidr.to_string(),
> +                        comment: entry.comment.clone(),
> +                    });
> +                }
> +                IpsetAddress::Range(range) => {
> +                    entries.extend(range.to_cidrs().into_iter().map(|cidr| Self {
> +                        nomatch: entry.nomatch,
> +                        cidr: cidr.to_string(),
> +                        comment: entry.comment.clone(),
> +                    }))
> +                }
> +            };
> +
> +            entries
> +        }
> +    }
> +
> +    #[derive(Clone, Debug, Default, Serialize)]
> +    pub struct SdnFirewallConfig {
> +        ipset: HashMap<String, Vec<LegacyIpsetEntry>>,
> +        ipset_comments: HashMap<String, String>,
> +    }
> +
> +    impl SdnFirewallConfig {
> +        pub fn new() -> Self {
> +            Default::default()
> +        }
> +
> +        pub fn extend_ipsets(&mut self, ipsets: impl IntoIterator<Item = Ipset>) {
> +            for ipset in ipsets {
> +                let entries = ipset
> +                    .iter()
> +                    .flat_map(LegacyIpsetEntry::from_ipset_entry)
> +                    .collect();
> +
> +                self.ipset.insert(ipset.name().name().to_string(), entries);
> +
> +                if let Some(comment) = &ipset.comment {
> +                    self.ipset_comments
> +                        .insert(ipset.name().name().to_string(), comment.to_string());
> +                }
> +            }
> +        }
> +    }
> +
> +    const SDN_RUNNING_CONFIG: &str = "/etc/pve/sdn/.running-config";
> +    const SDN_IPAM: &str = "/etc/pve/priv/ipam.db";
> +
> +    #[export]
> +    pub fn config(
> +        vnet_filter: Option<Vec<VnetName>>,
> +        vm_filter: Option<Vec<Vmid>>,
> +    ) -> Result<SdnFirewallConfig, Error> {
> +        let mut refs = SdnFirewallConfig::new();
> +
> +        match fs::read_to_string(SDN_RUNNING_CONFIG) {
> +            Ok(data) => {
> +                let running_config: RunningConfig = serde_json::from_str(&data)?;
> +                let sdn_config = SdnConfig::try_from(running_config)
> +                    .with_context(|| "Failed to parse SDN config".to_string())?;
> +
> +                let allowlist = vnet_filter.map(Allowlist::from_iter);
> +                refs.extend_ipsets(sdn_config.ipsets(allowlist.as_ref()));
> +            }
> +            Err(e) if e.kind() == io::ErrorKind::NotFound => (),
> +            Err(e) => {
> +                bail!("Cannot open SDN running config: {e:#}");
> +            }
> +        };
> +
> +        match fs::read_to_string(SDN_IPAM) {
> +            Ok(data) => {
> +                let ipam_json: IpamJson = serde_json::from_str(&data)?;
> +                let ipam: Ipam = Ipam::try_from(ipam_json)
> +                    .with_context(|| "Failed to parse IPAM".to_string())?;
> +
> +                let allowlist = vm_filter.map(Allowlist::from_iter);
> +                refs.extend_ipsets(ipam.ipsets(allowlist.as_ref()));
> +            }
> +            Err(e) if e.kind() == io::ErrorKind::NotFound => (),
> +            Err(e) => {
> +                bail!("Cannot open IPAM database: {e:#}");
> +            }
> +        };
> +
> +        Ok(refs)
> +    }
> +}
> diff --git a/pve-rs/src/lib.rs b/pve-rs/src/lib.rs
> index 42be39e..dae190e 100644
> --- a/pve-rs/src/lib.rs
> +++ b/pve-rs/src/lib.rs
> @@ -4,6 +4,7 @@
>  pub mod common;
>  
>  pub mod apt;
> +pub mod firewall;
>  pub mod openid;
>  pub mod resource_scheduling;
>  pub mod tfa;



_______________________________________________
pve-devel mailing list
pve-devel@lists.proxmox.com
https://lists.proxmox.com/cgi-bin/mailman/listinfo/pve-devel


  reply	other threads:[~2024-08-13 16:15 UTC|newest]

Thread overview: 43+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2024-06-26 12:15 [pve-devel] [RFC firewall/proxmox{-ve-rs, -firewall, -perl-rs} 00/21] autogenerate ipsets for sdn objects Stefan Hanreich
2024-06-26 12:15 ` [pve-devel] [PATCH proxmox-ve-rs 01/21] debian: add files for packaging Stefan Hanreich
2024-06-27 10:41   ` Gabriel Goller
2024-07-16 16:03     ` Thomas Lamprecht
2024-08-13 16:06   ` Max Carrara
2024-06-26 12:15 ` [pve-devel] [PATCH proxmox-ve-rs 02/21] firewall: add ip range types Stefan Hanreich
2024-08-13 16:08   ` Max Carrara
2024-06-26 12:15 ` [pve-devel] [PATCH proxmox-ve-rs 03/21] firewall: address: use new iprange type for ip entries Stefan Hanreich
2024-06-26 12:15 ` [pve-devel] [PATCH proxmox-ve-rs 04/21] ipset: add range variant to addresses Stefan Hanreich
2024-06-26 12:15 ` [pve-devel] [PATCH proxmox-ve-rs 05/21] iprange: add methods for converting an ip range to cidrs Stefan Hanreich
2024-08-13 16:09   ` Max Carrara
2024-06-26 12:15 ` [pve-devel] [PATCH proxmox-ve-rs 06/21] ipset: address: add helper methods Stefan Hanreich
2024-06-27 10:45   ` Gabriel Goller
2024-06-26 12:15 ` [pve-devel] [PATCH proxmox-ve-rs 07/21] firewall: guest: derive traits according to rust api guidelines Stefan Hanreich
2024-06-27 10:50   ` Gabriel Goller
2024-06-26 12:15 ` [pve-devel] [PATCH proxmox-ve-rs 08/21] common: add allowlist Stefan Hanreich
2024-06-27 10:47   ` Gabriel Goller
2024-06-26 12:15 ` [pve-devel] [PATCH proxmox-ve-rs 09/21] sdn: add name types Stefan Hanreich
2024-06-27 10:56   ` Gabriel Goller
2024-07-16  9:27     ` Stefan Hanreich
2024-06-26 12:15 ` [pve-devel] [PATCH proxmox-ve-rs 10/21] sdn: add ipam module Stefan Hanreich
2024-08-13 16:12   ` Max Carrara
2024-06-26 12:15 ` [pve-devel] [PATCH proxmox-ve-rs 11/21] sdn: ipam: add method for generating ipsets Stefan Hanreich
2024-06-26 12:15 ` [pve-devel] [PATCH proxmox-ve-rs 12/21] sdn: add config module Stefan Hanreich
2024-06-27 10:54   ` Gabriel Goller
2024-07-16  9:28     ` Stefan Hanreich
2024-06-26 12:15 ` [pve-devel] [PATCH proxmox-ve-rs 13/21] sdn: config: add method for generating ipsets Stefan Hanreich
2024-06-26 12:15 ` [pve-devel] [PATCH proxmox-ve-rs 14/21] tests: add sdn config tests Stefan Hanreich
2024-06-26 12:15 ` [pve-devel] [PATCH proxmox-ve-rs 15/21] tests: add ipam tests Stefan Hanreich
2024-06-26 12:15 ` [pve-devel] [PATCH proxmox-firewall 16/21] cargo: update dependencies Stefan Hanreich
2024-06-26 12:15 ` [pve-devel] [PATCH proxmox-firewall 17/21] config: tests: add support for loading sdn and ipam config Stefan Hanreich
2024-06-26 12:15 ` [pve-devel] [PATCH proxmox-firewall 18/21] ipsets: autogenerate ipsets for vnets and ipam Stefan Hanreich
2024-06-26 12:15 ` [pve-devel] [PATCH pve-firewall 19/21] add support for loading sdn firewall configuration Stefan Hanreich
2024-08-13 16:14   ` Max Carrara
2024-06-26 12:15 ` [pve-devel] [PATCH pve-firewall 20/21] api: load sdn ipsets Stefan Hanreich
2024-06-26 12:34   ` Stefan Hanreich
2024-06-26 12:15 ` [pve-devel] [PATCH proxmox-perl-rs 21/21] add PVE::RS::Firewall::SDN module Stefan Hanreich
2024-08-13 16:14   ` Max Carrara [this message]
2024-06-28 13:46 ` [pve-devel] [RFC firewall/proxmox{-ve-rs, -firewall, -perl-rs} 00/21] autogenerate ipsets for sdn objects Gabriel Goller
2024-07-16  9:33   ` Stefan Hanreich
2024-08-13 16:06 ` Max Carrara
2024-09-24  8:41 ` Thomas Lamprecht
2024-10-10 15:59 ` Stefan Hanreich

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=D3EX1L38BR0Y.3RTSBJQO8U64M@proxmox.com \
    --to=m.carrara@proxmox.com \
    --cc=pve-devel@lists.proxmox.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox
Service provided by Proxmox Server Solutions GmbH | Privacy | Legal